Chapter 40: Security Policies and Plans Development

Keith Lewis     Keller Graduate School of Management, kCura, Chicago, IL, United States

Abstract

This chapter covers the importance and structure of security policies. The chapter also goes over security plans development methodologies that are used in modern assessment and security project implementation practices, today.

Keywords

Assessments; CoBIT; Controls; Development; Guidelines; ISACA; Planning; Policies; Policy; Procedures; Remediation; Scope; Security

1. Introduction: Policies and Planning: Security Framework Foundation

When building a solid house of security frameworks (Fig. 40.1), a strong foundation backed by fortified support points is required or the structure is bound to collapse at ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.